|
||||||
|
||
|
Home > Secure files software |
Related keywords: files, secure, hide files, Secure, Files, PDF files, compare files, protect files, duplicate files, delete files |
|
|
21. | Super Encryption Box 2.4 (loosesoft.com) | ||
space--perfect for offices that need to keep important documents secure. Super Encryptoin Box adds a context menu entry to all files and | |||
Updated: 3, 2005 | Rating: 0 | Author: Ming Dave | Size: 135 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
22. | Super File Encryption 3.5 (fileencryption.org) | ||
File Encryption is a powerful and easy-to-use program for encrypting and protecting your data--perfect for offices that need to keep important documents secure. Super File Encryption adds a context menu entry to all files and folders. To encrypt or decrypt files/folder, simply right-click on the files/folder in Explorer and select Encrypt or | |||
Updated: 9, 2005 | Rating: 0 | Author: Anderson Trueman | Size: 900 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
23. | TinyWeb 1.9 (ritlabs.com) | ||
is extremely small (executable file size is 53K), simple (no any configuration except command line) and fast (consumes minimum of system resources) Win32 daemon for regular (TCP/http) and secure (SSL/TLS/https) web servers. This program is FREE for commercial and non-commercial use. The only restriction is that copyright holder must be attributed with the development of | |||
Updated: 9, 2005 | Rating: 0 | Author: Maxim Masiutin | Size: 182 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
24. | Transparent Screen Lock for WinNT/2000/XP/2003 2.10 (e-motional.com) | ||
the password. Prevent access via CRTL-ALT-DEL. Includes a log file to track activity and failed login attempts. Save log file locally or at a remote network location. Use quick-launch icon to enable password protection anytime, or configure program like a screensaver to be enabled automatically at a preset time interval. Includes option to remove icons and task bar from | |||
Updated: 9, 2005 | Rating: 370 | Author: Sandra Buckingham | Size: 562 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
25. | Webcam Watchdog 4.0 (webcam123.com) | ||
of video. Webcam Watchdog can automatically delete the oldest video files, allowing you to capture data forever in a maintenance-free mode. The program's built-in web server makes it easy to retrieve your video archives securely and remotely. There is even a log that keeps track of who accessed Webcam Watchdog remotely. In addition to using the program as a web | |||
Updated: 3, 2005 | Rating: 48 | Author: Kaiwen Cheng | Size: 9467 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
26. | Woodstock Personal Digital Server - Std. Edition 1.0 (woodstocksystems.com) | ||
Woodstock Personal Digital Server (PDS) provides secure P2P MP3 file sharing, remote access, management of your digital music files & playlists, and tunes in to thousands of the best Internet radio stations. The Woodstock PDS's unique, secure, file lending method allows a user to remotely access and lend their digital media files. Now you can | |||
Updated: 9, 2005 | Rating: 0 | Author: James Hoffman | Size: 4637 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
27. | ! Custom Addressbook 4.5 (freebyte.com) | ||
An advantage of its small size, is that the program and its database file can run directly from a floppy disk. This means, that anywhere you may be, if you can make use of a computer, then you can also access your Custom Addressbook! All you need is to have with you the diskette with the program and | |||
Updated: 2, 2006 | Rating: 42 | Author: Henk Hagedoorn | Size: 900 kb | Shareware Go to category: Business > Other Similar programs | |||
28. | GuardMax 2.0 (gemx.com) | ||
be able to keep your sensitive information and passwords safe and secure. Program offers many encryption methods to choose from to encrypt your confidential data at various levels. Detailed information about encryption methods used in GuardMax is provided in 'Encryption Info' section of its help file when you are not sure which method to use. GuardMax uses multi-level | |||
Updated: 9, 2005 | Rating: 0 | Author: John Summers | Size: 1974 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
29. | .hiContact. 1.7 (gemx.com) | ||
and easy to use contact manager. Keeping contact details in a secure and dependable environment can effect the shaping of your future greatly. Contacts are not only important to have an enjoyable social life but also at work they can play a decisive role to fulfill our goals. As old saying goes 'It's not what you know, but who you know that counts', amplifies the | |||
Updated: 9, 2005 | Rating: 42 | Author: John Summers | Size: 1691 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
30. | Abacre Restaurant Point of Sales 1.8 (abacre.com) | ||
interface is carefully optimized for high speed input of a patron's order and the prevention of common mistakes. It's designed for using on multiple computers, and contains reliable and secure authorization levels. The layouts of the guest bill can be customized, and the program can | |||
Updated: 9, 2005 | Rating: 178 | Author: Roman Vasin | Size: 1516 kb | Shareware Go to category: Business > Vertical Market Apps Similar programs | |||
|
Home > Secure files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|